Butterfly #241
These are the best cards I’ve made so far:
These are the best cards I’ve made so far:
Beginning OpenGL Game Programming came in the mail 4 hours ago, and I’m already finished reading through it. Its pretty damn good, though I was hoping it would cover some things like vertex arrays (aka vertex buffer objects) and shaders, but meh.
Anyway, I’m going to scrap most of the OGL classes I’ve written thus far. Well, I’m going to refuctor them. Wholly refuctor them. Because right now they suck.
I can’t wait for More OpenGL Game Programming :D
7 commentsToday was my first real experience using BitTorrent, I’m trying to download something which was leaked recently that I can presumably watch and lol at but I don’t want to tell you what it is because that might deem my activities illegal.
Since I haven’t said WHAT I’m downloading, Heisenburg says I’m still good.
Anyway, stupid me chose a slow torrent, and Evil Steve is all like “lol har har you stupid I got it 5 hours ago” and I’m all like “:(”
So yeah. Starting a second torrent (this one hopefully faster) to download it.
11 comments:D
5 commentsOkay, so explorer was hogging all of my CPU cycles (which was really weird) and I’ll look into it a little later. Probably nothing, but to be on the safe side I’ve switched to firefox for the time being.
something to hold your attention:
Quote:
Every Hard drive has a unique IP address. An IP address is used by the internet so the governmnet can keep track of you. That way if someone is doing something illegal, such as hacking, the government or police can identify this person by their IP address, simmilar to a cars liscence plate. Some hackers however, have found ways to steal peoples IP address by using special virusses called trojan horses. Once the hacker has stolen someones IP address, they can use it while hacking to avoid being caught.
stealing IP addresses is illegal and I will not be explaining how to do it here.
3 comments
Next Page »